{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T12:59:19Z","timestamp":1762001959643},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T00:00:00Z","timestamp":1701907200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T00:00:00Z","timestamp":1701907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Key Program of Natural Science Fund of Tianjin, China","award":["21JCZDJC00130"],"award-info":[{"award-number":["21JCZDJC00130"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s11760-023-02883-7","type":"journal-article","created":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T06:02:07Z","timestamp":1701928927000},"page":"1747-1761","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A lightweight robust image hash based on random tensors and angle features for IoT devices"],"prefix":"10.1007","volume":"18","author":[{"given":"Hang","family":"Gao","sequence":"first","affiliation":[]},{"given":"Tiegang","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,7]]},"reference":[{"issue":"14","key":"2883_CR1","first-page":"1678","volume":"8","author":"F Zhu","year":"2021","unstructured":"Zhu, F., Yi, X., Abuadbba, A., Khalil, I., Nepal, S., Huang, X.: Cost-effective authenticated data redaction with privacy protection in IoT. IEEE Internet Things J. 8(14), 1678\u201311689 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"2022","key":"2883_CR2","first-page":"1","volume":"16","author":"A Soualmi","year":"2022","unstructured":"Soualmi, A., Alti, A., Laouamer, L.: An imperceptible watermarking scheme for medical image tamper detection. Int. J. Inf. Secur. Priv. 16(2022), 1\u201318 (2022)","journal-title":"Int. J. Inf. Secur. Priv."},{"issue":"2021","key":"2883_CR3","doi-asserted-by":"crossref","first-page":"2279","DOI":"10.1007\/s11042-020-09614-x","volume":"80","author":"A Soualmi","year":"2021","unstructured":"Soualmi, A., Alti, A., Laouamer, L.: A novel blind watermarking approach for medical image authentication using MinEigen value features. Multimedia Tools Appl. 80(2021), 2279\u20132293 (2021)","journal-title":"Multimedia Tools Appl."},{"key":"2883_CR4","doi-asserted-by":"crossref","unstructured":"Bhuvaneswari, R., Ganesh Vaidyanathan, S.: Classification and grading of diabetic retinopathy images using mixture of ensemble classifiers. J. Intell. Fuzzy Syst. 41(6) ,7407\u20137419 (2021)","DOI":"10.3233\/JIFS-211364"},{"issue":"2018","key":"2883_CR5","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.comnet.2018.01.039","volume":"134","author":"W Feng","year":"2018","unstructured":"Feng, W., Qin, Y., Zhao, S., Feng, D.: AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Netw. 134(2018), 167\u2013182 (2018)","journal-title":"Comput. Netw."},{"issue":"5","key":"2883_CR6","doi-asserted-by":"crossref","first-page":"8393","DOI":"10.1109\/JIOT.2019.2917546","volume":"6","author":"R Ding","year":"2019","unstructured":"Ding, R., Zhong, H., Ma, J., Liu, X., Ning, J.: Lightweight privacy-preserving identity-based verifiable IoT-based health storage system. IEEE Internet Things J. 6(5), 8393\u20138405 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"2883_CR7","first-page":"167","volume":"67","author":"AS Unde","year":"2020","unstructured":"Unde, A.S., Deepthi, P.P.: Design and analysis of compressive sensing-based lightweight encryption scheme for multimedia IoT. IEEE Trans. Circuits Syst. II Express Briefs 67(1), 167\u2013171 (2020)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"2883_CR8","first-page":"118","volume":"2019","author":"K Quist-Aphetsi","year":"2019","unstructured":"Quist-Aphetsi, K., Baffour Senkyire, I.: Validating of digital forensic images using SHA-256. Proc. Int. Conf. Cyber Security Internet Things (ICSIoT) 2019, 118\u2013121 (2019)","journal-title":"Proc. Int. Conf. Cyber Security Internet Things (ICSIoT)"},{"key":"2883_CR9","doi-asserted-by":"publisher","unstructured":"Hadmi, A., Puech, W., Said, B.A.E., Quahman, A.A.: Perceptual image hashing. In: Gupta, M.D. (Ed.), Computer and Information Science: Watermarking, vol. 2, Rijeka, Croatia: InTech (2012). https:\/\/doi.org\/10.5772\/37435.","DOI":"10.5772\/37435"},{"key":"2883_CR10","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/1288869.1288886","volume":"2007","author":"S Xiang","year":"2007","unstructured":"Xiang, S., Kim, H.J., Huang, J.: Histogram-based image hashing scheme robust against geometric deformations. Proc. ACM Multimedia Security Workshop 2007, 121\u2013128 (2007)","journal-title":"Proc. ACM Multimedia Security Workshop"},{"issue":"2012","key":"2883_CR11","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11042-010-0724-7","volume":"61","author":"YS Choi","year":"2012","unstructured":"Choi, Y.S., Park, J.H.: Image hash generation method using hierarchical histogram. Multimedia Tool Appl. 61(2012), 181\u2013194 (2012)","journal-title":"Multimedia Tool Appl."},{"key":"2883_CR12","doi-asserted-by":"crossref","unstructured":"Tang, Z., Huang, L., Dai, Y., Yang, F.: Robust image hashing based on multiple histograms. Int. J. Digital Content Technol. Appl., 3(23), 39\u201347 (2012)","DOI":"10.4156\/jdcta.vol6.issue23.5"},{"issue":"11","key":"2883_CR13","doi-asserted-by":"crossref","first-page":"6585","DOI":"10.1007\/s11042-015-2591-8","volume":"75","author":"LN Vadlamudi","year":"2016","unstructured":"Vadlamudi, L.N., Vaddella, R.P.V., Devara, V.: Robust hash generation technique for content-based image authentication using histogram. Multimedia Tools Appl. 75(11), 6585\u20136604 (2016)","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"2883_CR14","first-page":"1884","volume":"27","author":"J Ji","year":"2018","unstructured":"Ji, J., Han, L., Wei, J., et al.: Histogram-based perceptual hash algorithm for synthetic aperture radar image segmentation. J. Electron. Imaging 27(3), 1884\u20132022 (2018)","journal-title":"J. Electron. Imaging"},{"issue":"1","key":"2883_CR15","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","volume":"8","author":"Y Zhao","year":"2013","unstructured":"Zhao, Y., Wang, S., Zhang, X., Yao, H.: Robust hashing for image authentication using Zernike moments and local features. IEEE Trans. Inf. Forensics Security 8(1), 55\u201363 (2013)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"8","key":"2883_CR16","doi-asserted-by":"crossref","first-page":"4639","DOI":"10.1007\/s11042-015-2496-6","volume":"75","author":"R Davarzani","year":"2016","unstructured":"Davarzani, R., Mozaffari, S., Yaghmaie, K.: Perceptual image hashing using center-symmetric local binary patterns. Multimedia Tools Appl. 75(8), 4639\u20134667 (2016)","journal-title":"Multimedia Tools Appl."},{"issue":"2016","key":"2883_CR17","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.ins.2016.04.036","volume":"361\u2013362","author":"C Qin","year":"2016","unstructured":"Qin, C., Chen, X., Ye, D., et al.: A novel image hashing scheme with perceptual robustness using block truncation coding. Inf. Sci. 361\u2013362(2016), 84\u201399 (2016)","journal-title":"Inf. Sci."},{"key":"2883_CR18","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2019.107244","volume":"166","author":"Q Shen","year":"2020","unstructured":"Shen, Q., Zhao, Y.: Perceptual hashing for color image based on color opponent component and quadtree structure. Signal Process. 166, 107244 (2020)","journal-title":"Signal Process."},{"issue":"3","key":"2883_CR19","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1109\/TKDE.2018.2837745","volume":"31","author":"Z Tang","year":"2019","unstructured":"Tang, Z., Chen, L., Zhang, X., et al.: Robust image hashing with tensor decomposition. IEEE Trans. Knowl. Data Eng. 31(3), 549\u2013560 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"11","key":"2883_CR20","doi-asserted-by":"crossref","first-page":"1656","DOI":"10.1093\/comjnl\/bxz127","volume":"64","author":"Z Tang","year":"2021","unstructured":"Tang, Z., Yu, M., Yao, H., Zhang, H., Yu, C., Zhang, X.: Robust image hashing with singular values of quaternion SVD. Comput. J. 64(11), 1656\u20131671 (2021)","journal-title":"Comput. J."},{"issue":"6","key":"2883_CR21","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.image.2011.04.007","volume":"26","author":"Y Lei","year":"2011","unstructured":"Lei, Y., Wang, Y., Huang, J.: Robust image hash in radon transform domain for authentication. Signal Process. Image Commun. 26(6), 280\u2013288 (2011)","journal-title":"Signal Process. Image Commun."},{"issue":"2\u20133","key":"2883_CR22","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/s11042-009-0437-y","volume":"52","author":"Z Tang","year":"2011","unstructured":"Tang, Z., Wang, S., Zhang, X., Wei, W., Zhao, Y.: Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tool Appl. 52(2\u20133), 325\u2013345 (2011)","journal-title":"Multimedia Tool Appl."},{"issue":"2","key":"2883_CR23","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.dsp.2012.11.002","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin, C., Chang, C.C., Tsou, P.L.: Robust image hashing using non-uniform sampling in discrete Fourier domain. Digital Signal Process. 23(2), 578\u2013585 (2013)","journal-title":"Digital Signal Process."},{"issue":"18","key":"2883_CR24","doi-asserted-by":"crossref","first-page":"5102","DOI":"10.1016\/j.ijleo.2014.05.015","volume":"125","author":"Z Tang","year":"2014","unstructured":"Tang, Z., Yang, F., Huang, L., Zhang, X.: Robust image hashing with dominant DCT coefficients. Optik-Int. J. Light Electron Opt. 125(18), 5102\u20135107 (2014)","journal-title":"Optik-Int. J. Light Electron Opt."},{"issue":"3","key":"2883_CR25","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1049\/iet-ipr.2013.0332","volume":"8","author":"Z Tang","year":"2014","unstructured":"Tang, Z., Dai, Y., Zhang, X.Q., Huang, L., Yang, F.: Robust image hashing via color vector angles and discrete wavelet transform. IET Image Proc. 8(3), 142\u2013149 (2014)","journal-title":"IET Image Proc."},{"issue":"8","key":"2883_CR26","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.cose.2016.07.006","volume":"62","author":"Z Tang","year":"2016","unstructured":"Tang, Z., Lao, H., Zhang, X., Liu, K.: Robust image hashing via DCT and LLE. Comput. Security 62(8), 133\u2013148 (2016)","journal-title":"Comput. Security"},{"key":"2883_CR27","first-page":"1","volume":"31","author":"RK Karsh","year":"2017","unstructured":"Karsh, R.K., Laskar, R.H., Aditi, S.: Robust image hashing through DWT-SVD and spectral residual method. EURASIP J. Image Video Process. 31, 1\u201317 (2017)","journal-title":"EURASIP J. Image Video Process."},{"issue":"4","key":"2883_CR28","doi-asserted-by":"crossref","first-page":"1963","DOI":"10.1109\/TIP.2011.2171698","volume":"21","author":"Y Li","year":"2012","unstructured":"Li, Y., Lu, Z., Zhu, C., Niu, X.: Robust image hashing based on random Gabor filtering and dithered lattice vector quantization. IEEE Trans. Image Process. 21(4), 1963\u20131980 (2012)","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"2883_CR29","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.aeue.2016.03.010","volume":"70","author":"Z Tang","year":"2016","unstructured":"Tang, Z., Huang, L., Zhang, X., Lao, H.: Robust image hashing based on color vector angle and Canny operator. AEU Int. J. Electron. Commun. 70(6), 833\u2013841 (2016)","journal-title":"AEU Int. J. Electron. Commun."},{"issue":"6","key":"2883_CR30","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.sigpro.2017.02.008","volume":"137","author":"Z Tang","year":"2017","unstructured":"Tang, Z., Huang, Z., Zhang, X., Lao, H.: Robust image hashing with multidimensional scaling. Signal Process. 137(6), 240\u2013250 (2017)","journal-title":"Signal Process."},{"issue":"2018","key":"2883_CR31","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.sigpro.2017.07.019","volume":"142","author":"C Qin","year":"2018","unstructured":"Qin, C., Sun, M., Chang, C.C.: Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process. 142(2018), 194\u2013205 (2018)","journal-title":"Signal Process."},{"issue":"2018","key":"2883_CR32","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.neucom.2018.04.057","volume":"308","author":"Z Tang","year":"2018","unstructured":"Tang, Z., Li, X., Zhang, X., et al.: Image hashing with color vector angle. Neurocomputing 308(2018), 147\u2013158 (2018)","journal-title":"Neurocomputing"},{"issue":"8","key":"2883_CR33","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.18520\/cs\/v117\/i8\/1340-1344","volume":"117","author":"KM Singh","year":"2019","unstructured":"Singh, K.M., Neelima, A., Tuithung, T., Singh, K.M.: Robust perceptual image hashing using SIFT and SVD. Curr. Sci. 117(8), 1340\u20131344 (2019)","journal-title":"Curr. Sci."},{"issue":"11","key":"2883_CR34","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1093\/comjnl\/bxy047","volume":"61","author":"Z Tang","year":"2018","unstructured":"Tang, Z., Huang, Z., Yao, H.: Perceptual image hashing with weighted DWT features for reduced-reference image quality assessment. Comput. J. 61(11), 1695\u20131709 (2018)","journal-title":"Comput. J."},{"issue":"5","key":"2883_CR35","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1049\/iet-ipr.2019.1157","volume":"14","author":"Z Tang","year":"2020","unstructured":"Tang, Z., Zhang, H., Pun, C.-M., et al.: Robust image hashing with visual attention model and invariant moments. IET Image Process. 14(5), 901\u2013908 (2020)","journal-title":"IET Image Process."},{"issue":"2021","key":"2883_CR36","volume":"78","author":"X Wang","year":"2021","unstructured":"Wang, X., Zhang, Q., Jiang, C., Xue, J.: Perceptual hash-based coarse-to-fine grained image tampering forensics method. J. Vis. Commun. Image Represent. 78(2021), 103124 (2021)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"2021","key":"2883_CR37","doi-asserted-by":"crossref","first-page":"1516","DOI":"10.1109\/TMM.2020.2999188","volume":"23","author":"Z Huang","year":"2021","unstructured":"Huang, Z., Liu, S.: Perceptual image hashing with texture and invariant vector distance for copy detection. IEEE Trans. Multimedia 23(2021), 1516\u20131529 (2021)","journal-title":"IEEE Trans. Multimedia"},{"issue":"2021","key":"2883_CR38","volume":"90","author":"MF Khan","year":"2021","unstructured":"Khan, M.F., Monir, S.M., Naseem, I., Khan, B.M.: Adaptive just-noticeable difference profile for image hashing. Comput. Electr. Eng. 90(2021), 106967 (2021)","journal-title":"Comput. Electr. Eng."},{"key":"2883_CR39","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1186\/s13640-020-00509-3","volume":"21","author":"Z Tang","year":"2020","unstructured":"Tang, Z., Zhang, H., Lu, S., et al.: Robust image hashing with compressed sensing and ordinal measures. EURASIP J. Image Video Process. 21, 509 (2020). https:\/\/doi.org\/10.1186\/s13640-020-00509-3","journal-title":"EURASIP J. Image Video Process."},{"issue":"11","key":"2883_CR40","doi-asserted-by":"crossref","first-page":"1656","DOI":"10.1093\/comjnl\/bxz127","volume":"64","author":"Z Tang","year":"2021","unstructured":"Tang, Z., Yu, M., Yao, H., et al.: Robust image hashing with singular values of quaternion SVD. Comput. J. 64(11), 1656\u20131671 (2021)","journal-title":"Comput. J."},{"issue":"4","key":"2883_CR41","doi-asserted-by":"crossref","first-page":"3765","DOI":"10.1109\/TKDE.2021.3131188","volume":"35","author":"X Liang","year":"2023","unstructured":"Liang, X., Tang, Z., Huang, Z., Zhang, X.: Zhang, S, Efficient hashing method using 2D\u20132D PCA for image copy detection. IEEE Trans. Knowl. Data Eng. 35(4), 3765\u20133778 (2023)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2883_CR42","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1109\/TMM.2021.3139217","volume":"25","author":"X Liang","year":"2023","unstructured":"Liang, X., Tang, Z., Wu, J., Li, Z., Zhang, X.: Robust image hashing with isomap and saliency map for copy detection. IEEE Trans. Multimedia 25, 1085\u20131097 (2023)","journal-title":"IEEE Trans. Multimedia"},{"issue":"1","key":"2883_CR43","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1109\/TDSC.2021.3136163","volume":"20","author":"Z Huang","year":"2023","unstructured":"Huang, Z., Tang, Z., Zhang, X., Ruan, L., Zhang, X.: Perceptual image hashing with locality preserving projection for copy detection. IEEE Trans. Dependable Secure Comput. 20(1), 463\u2013477 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"2883_CR44","doi-asserted-by":"crossref","first-page":"1404","DOI":"10.1109\/TIFS.2022.3161149","volume":"17","author":"X Li","year":"2022","unstructured":"Li, X., Qin, C., Wang, Z., Qian, Z., Zhang, X.: Unified performance evaluation method for perceptual image hashing. IEEE Trans. Inf. Forensics Secur. 17, 1404\u20131419 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2883_CR45","doi-asserted-by":"crossref","unstructured":"Liu, M., Gao, H., Xia, X., Gui, S., Gao, T.: Perceptual image hashing based on Canny operator and tensor for copy-move forgery detection. Comput. J., bxac186 (2022)","DOI":"10.1093\/comjnl\/bxac186"},{"key":"2883_CR46","volume":"227","author":"M Roy","year":"2023","unstructured":"Roy, M.: Dalton Meitei Thounaojam, Shyamosree Pal, A perceptual hash based blind-watermarking scheme for image authentication. Expert Syst. Appl. 227, 120237 (2023)","journal-title":"Expert Syst. Appl."},{"key":"2883_CR47","volume":"77","author":"L Du","year":"2023","unstructured":"Du, L., Shang, Q., Wang, Z., Wang, X.: Robust image hashing based on multi-view dimension reduction. J. Inf. Security Appl. 77, 103578 (2023)","journal-title":"J. Inf. Security Appl."},{"key":"2883_CR48","unstructured":"USC-SIPI Image Database [Online]. Available: http:\/\/sipi.usc.edu\/database\/. Accessed on: 2018"},{"key":"2883_CR49","unstructured":"Franzen, R.: Kodak lossless true color image suite. [Online]. Available: http:\/\/r0k.us\/graphics\/kodak\/, Accessed April 15, 2017"},{"key":"2883_CR50","doi-asserted-by":"crossref","unstructured":"Jegou, H.: INRIA Copydays dataset. [Online]. Available: http:\/\/lear.inrialpes.fr\/_jegou\/data.php, Accessed May 28, 2016","DOI":"10.18356\/174851f3-en"},{"key":"2883_CR51","unstructured":"Schaefer, G., Stich, M.: UCID-An uncompressed color image database. In Proceedings of SPIE Storage Retrieval Methods Appl. Multimedia, pp. 472\u2013480 (2004)"},{"issue":"8","key":"2883_CR52","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recognit. Letters 27(8), 861\u2013874 (2006)","journal-title":"Pattern Recognit. Letters"},{"key":"2883_CR53","first-page":"590","volume-title":"Testing Statistical Hypotheses","author":"EL Lehmann","year":"2005","unstructured":"Lehmann, E.L., Romano, J.P.: Testing Statistical Hypotheses, 3rd edn., pp. 590\u2013599. Springer, New York, USA (2005)","edition":"3"},{"issue":"24","key":"2883_CR54","doi-asserted-by":"crossref","first-page":"17669","DOI":"10.1109\/JIOT.2021.3082150","volume":"8","author":"F Rezaeibagha","year":"2021","unstructured":"Rezaeibagha, F., Mu, Y., Huang, K., Zhang, L., et al.: Secure and privacy-preserved data collection for IoT wireless sensors. IEEE Internet Things J. 8(24), 17669\u201317677 (2021)","journal-title":"IEEE Internet Things J."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02883-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02883-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02883-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T09:22:06Z","timestamp":1708680126000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02883-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,7]]},"references-count":54,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["2883"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02883-7","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,7]]},"assertion":[{"value":"7 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Research does not involve human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}